News & Analysis as of

Science, Computers & Technology Military

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Presidential Executive Order on Cybersecurity: No More Antiquated IT

On May 11, President Donald Trump issued his long-awaited Executive Order on cybersecurity, the ‘‘Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.’’ It had been...more

Trump Executive Order Addresses Executive Branch, Critical Infrastructure Cybersecurity

by Dechert LLP on

President Donald J. Trump issued an Executive Order on May 11, 2017 aimed at “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” (the “Order”). The Order mandates federal governmental review of...more

NISPOM Change 2 Deadlines Coming for Cleared Contractors

by Hogan Lovells on

As industry comes up on the one-year anniversary of the publication of Change 2 to the National Industrial Security Program Operating Manual (NISPOM)1, a number of implementation deadlines are drawing near. This blog post...more

"Double Dip" Effectively Approved by Center for Medicare and Medicaid Services

by Hogan Lovells on

Last week the Centers for Medicare and Medicaid Services (CMS) issued Release No. 104 to Manufacturers and Release No. 180, which invalidated earlier agency releases addressing the treatment under the Medicaid drug rebate...more

White House Signs New Cybersecurity Executive Order

by Dentons on

On May 11, 2017, President Donald Trump signed a new Executive Order on cybersecurity entitled Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The new order is split up into three sections,...more

Insider Threat Program Awareness Training Deadline - Cybersecurity and Privacy Team Alert

In May 2016, the Under Secretary of Defense for Intelligence issued a requirement for cleared government contractors to establish an “insider threat program” (ITP) to better protect national security networks from...more

Top unmanned aircraft systems developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies are not new to game-changing technology innovations. It is therefore no surprise that a number of ADG companies are early investors in unmanned aircraft systems...more

Top trade secret developments in 2017 for ADG companies

by Hogan Lovells on

Trade secrets form one of the most valuable assets of technology companies. The protection of trade secrets is widely seen as essential to foster innovation and economic growth. This past year, both the United States (U.S.)...more

Top M&A developments in 2017 for ADG companies

by Hogan Lovells on

We expect 2017 M&A activity in the aerospace, defense, and government services (ADG) industry sector to equal or surpass 2016 M&A activity. Although 2016 M&A activity was down both by volume and value over 2015 it was...more

Top international trade and export control developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies increasingly rely on international customers and global supply chains to stay competitive in today’s global market. In the United States, ADG companies rely heavily...more

FAA Publishes Notice to Airman Restricting UAS Flights Over 133 Military Facilities

On April 7, 2017, the Federal Aviation Administration (FAA) published a Notice to Airmen (Notice) that becomes effective on April 14, 2017. The Notice prohibits the operation of unmanned aircraft systems (UAS) over 133...more

Top cybersecurity developments in 2017 for ADG companies

by Hogan Lovells on

While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more

Top commercial space developments in 2017 for ADG companies

by Hogan Lovells on

Thinking big and small(sat) satellites - The Huffington Post recently identified “Top 10 Tech Trends Transforming Humanity.”1 The first of these transformative tech trends was labeled “we are hyper-connecting the world”...more

DOD U.S.-CERT Cybersecurity Incident Reporting for Defense Contractors Effective April 1, 2017

New U.S. Computer Emergency Readiness Team (U.S.-Cert) guidelines around incident reporting went into effect this week (April 1, 2017). The guidelines require all federal departments and agencies, state, local, tribal and...more

Air Force Security Clearance Files Compromised on Unsecured Backup Drive

Security researchers have discovered that an unsecured backup drive has compromised thousands of U.S. Air Force documents, including personnel files and sensitive forms filled out by senior and high-ranking officials. These...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

U.S. Military Special Operations Command Workers’ Data Exposed by Vendor

Military personnel continue to be victimized by data breaches. This time, the personal information of healthcare workers employed by Potomac Healthcare Solutions (Potomac), who work for a U.S. Special Operations Command were...more

U.S. Navy Announces Breach of 134,386 Sailors’ Information from Laptop of Vendor

The U.S. Navy has revealed that it has been notified by one of its vendors that a laptop of the contractor was the source of a data breach that compromised the names and Social Security numbers of 134,386 current and former...more

DFARS and DIB: Compliance Steps for DoD’s Newly Finalized Cybersecurity Rules for Contractors

by Orrick - Trust Anchor on

For businesses that work with the U.S. Department of Defense (“DoD”), two important rules for safeguarding certain categories of sensitive information and reporting cyber incidents were recently finalized, updating the...more

Proposed IR&D DFARS rule would competitively punish technology innovators

by Dentons on

Understanding that it will punish innovative contractors for engaging in independent research and development (IR&D) and taking on risks that would otherwise be borne by the government, on November 4, 2016, the US Department...more

Department of Defense Issues Final Version of Key Cybersecurity Rule

by WilmerHale on

On October 21, 2016, the Department of Defense (DoD) issued its final rule on Network Penetration Reporting and Contracting for Cloud Services, amending an interim version issued on August 26, 2015, and revised on December...more

DoD Finalizes Cybersecurity and Cloud Computing Rule

by Holland & Knight LLP on

On October 21, 2016, the Department of Defense (DoD) issued a final rule following-up on the interim rules it had issued on August 26 and December 30, 2015, regarding safeguarding contractor networks and purchasing cloud...more

DOJ Charges Defense Contractor with Removal and Retention of Classified Materials

The Department of Justice (DOJ) yesterday announced that it has charged a Maryland man, Harold Thomas Martin III with theft of government property and unauthorized removal and retention of classified materials by a government...more

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Final Rules Affecting Definitions of Export and Fundamental Research Take Effect

by Holland & Knight LLP on

Amended definitions under the Export Administration Regulations (EAR) and the International Traffic in Arms Regulations (ITAR) became effective today, Sept. 1, 2016. Although there are no significant changes to the scope or...more

319 Results
|
View per page
Page: of 13
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.